Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2688073.2688074acmconferencesArticle/Chapter ViewAbstractPublication PagesitcsConference Proceedingsconference-collections
research-article

Zero-Information Protocols and Unambiguity in Arthur-Merlin Communication

Published: 11 January 2015 Publication History

Abstract

We study whether information complexity can be used to attack the long-standing open problem of proving lower bounds against Arthur{Merlin (AM) communication protocols. Our starting point is to show that|in contrast to plain randomized communication complexity|every boolean function admits an AM communication protocol where on each yes- input, the distribution of Merlin's proof leaks no information about the input and moreover, this proof is unique for each outcome of Arthur's randomness. We posit that these two properties of zero information leakage and unambiguity on yes-inputs are interesting in their own right and worthy of investigation as new avenues toward AM.
Zero-information protocols (ZAM). Our basic ZAM protocol uses exponential communication for some functions, and this raises the question of whether more efficient protocols exist. We prove that all functions in the classical space-bounded complexity classes NL and L have polynomial-communication ZAM protocols. We also prove that ZAM complexity is lower bounded by conondeterministic communication complexity.
Unambiguous protocols (UAM). Our most technically substantial result is a (n) lower bound on the UAM complexity of the NP-complete set-intersection function; the proof uses information complexity arguments in a new, indirect way and overcomes the \zero-information barrier" described above. We also prove that in general, UAM complexity is lower bounded by the classic discrepancy bound, and we give evidence that it is not generally lower bounded by the classic corruption bound.

References

[1]
S. Aaronson and A. Wigderson. Algebrization: A new barrier in complexity theory. ACM Transactions on Computation Theory, 1(1), 2009.
[2]
A. Ada, A. Chattopadhyay, S. Cook, L. Fontes, M. Kouck y, and T. Pitassi. The hardness of being private. ACM Transactions on Computation Theory, 6(1), 2014.
[3]
B. Applebaum, Y. Ishai, and E. Kushilevitz. Cryptography in NC 0. SIAM Journal on Computing, 36(4):845--888, 2006.
[4]
L. Babai, P. Frankl, and J. Simon. Complexity classes in communication complexity theory. In Proceedings of the 27th Symposium on Foundations of Computer Science (FOCS), pages 337--347. IEEE, 1986.
[5]
L. Babai and S. Moran. Arthur--Merlin games: A randomized proof system, and a hierarchy of complexity classes. Journal of Computer and System Sciences, 36(2):254--276, 1988.
[6]
Z. Bar-Yossef, T. Jayram, R. Kumar, and D. Sivakumar. An information statistics approach to data stream and communication complexity. Journal of Computer and System Sciences, 68(4):702--732, 2004.
[7]
R. Beigel, N. Reingold, and D. Spielman. PP is closed under intersection. Journal of Computer and System Sciences, 50(2):191--202, 1995.
[8]
E. Böhler, C. Gla er, and D. Meister. Error-bounded probabilistic computations between MA and AM. Journal of Computer and System Sciences, 72(6):1043--1076, 2006.
[9]
M. Braverman, F. Ellen, R. Oshman, T. Pitassi, and V. Vaikuntanathan. A tight bound for set disjointness in the message-passing model. In Proceedings of the 54th Symposium on Foundations of Computer Science (FOCS), pages 668--677. IEEE, 2013.
[10]
M. Braverman, A. Garg, D. Pankratov, and O. Weinstein. From information to exact communication. In Proceedings of the 45th Symposium on Theory of Computing (STOC), pages 151--160. ACM, 2013.
[11]
M. Braverman and A. Moitra. An information complexity approach to extended formulations. In Proceedings of the 45th Symposium on Theory of Computing (STOC), pages 161--170. ACM, 2013.
[12]
A. Chakrabarti, G. Cormode, N. Goyal, and J. Thaler. Annotations for sparse data streams. In Proceedings of the 25th Symposium on Discrete Algorithms (SODA), pages 687--706. ACM-SIAM, 2014.
[13]
A. Chakrabarti, G. Cormode, and A. McGregor. Annotations in data streams. In Proceedings of the 36th International Colloquium on Automata, Languages, and Programming (ICALP), pages 222--234. Springer, 2009.
[14]
A. Chakrabarti, G. Cormode, A. McGregor, J. Thaler, and S. Venkatasubramanian. On interactivity in Arthur--Merlin communication and stream computation. Technical Report TR13--180, Electronic Colloquium on Computational Complexity (ECCC), 2013. URL: http://eccc.hpi-web.de/report/2013/180/.
[15]
A. Chakrabarti, S. Khot, and X. Sun. Near-optimal lower bounds on the multi-party communication complexity of set disjointness. In Proceedings of the 18th Conference on Computational Complexity (CCC), pages 107--117. IEEE, 2003.
[16]
A. Chakrabarti, Y. Shi, A. Wirth, and A. Yao. Informational complexity and the direct sum problem for simultaneous message complexity. In Proceedings of the 42nd Symposium on Foundations of Computer Science (FOCS), pages 270--278. IEEE, 2001.
[17]
C. Damm. Problems complete for L. Information Processing Letters, 36(5):247--250, 1990.
[18]
A. Dasgupta, R. Kumar, and D. Sivakumar. Sparse and lopsided set disjointness via information theory. In Proceedings of the 16th International Workshop on Randomization and Computation (RANDOM), pages 517--528. Springer, 2012.
[19]
U. Feige, J. Kilian, and M. Naor. A minimal model for secure computation. In Proceedings of the 26th Symposium on Theory of Computing (STOC), pages 554--563. ACM, 1994.
[20]
A. Gál and A. Wigderson. Boolean complexity classes vs. their arithmetic analogs. Random Structures & Algorithms, 9(1--2):99--111, 1996. 3.0.CO;2--6.
[21]
D. Gavinsky and A. Sherstov. A separation of NP and coNP in multiparty communication complexity. Theory of Computing, 6(1):227--245, 2010.
[22]
M. Göös, S. Lovett, R. Meka, T. Watson, and D. Zuckerman. Rectangles are nonnegative juntas. Technical Report TR14--147, Electronic Colloquium on Computational Complexity (ECCC), 2014. URL: http://eccc.hpi-web.de/report/2014/147/.
[23]
M. Göös, T. Pitassi, and T. Watson. Zero-information protocols and unambiguity in Arthur--Merlin communication. Technical Report TR14-078, Electronic Colloquium on Computational Complexity (ECCC), 2014. Full version. URL: http://eccc.hpi-web.de/report/2014/078/.
[24]
M. Göös and T. Watson. Communication complexity of set-disjointness for all probabilities. In Proceedings of the 18th International Workshop on Randomization and Computation (RANDOM), pages 721--736. Schloss Dagstuhl, 2014.
[25]
A. Gronemeier. Asymptotically optimal lower bounds on the NIH-multi-party information complexity of the AND-function and disjointness. In Proceedings of the 26th International Symposium on Theoretical Aspects of Computer Science (STACS), pages 505--516. Schloss Dagstuhl, 2009.
[26]
T. Gur and R. Raz. Arthur--Merlin streaming complexity. In Proceedings of the 40th International Colloquium on Automata, Languages, and Programming (ICALP), pages 528--539. Springer, 2013.
[27]
T. Gur and R. Rothblum. Non-interactive proofs of proximity. Technical Report TR13-078, Electronic Colloquium on Computational Complexity (ECCC), 2013. URL: http://eccc.hpi-web.de/report/2013/078/.
[28]
R. Impagliazzo, V. Kabanets, and A. Kolokolova. An axiomatic approach to algebrization. In Proceedings of the 41st Symposium on Theory of Computing (STOC), pages 695--704. ACM, 2009.
[29]
R. Impagliazzo and R. Williams. Communication complexity with synchronized clocks. In Proceedings of the 25th Conference on Computational Complexity (CCC), pages 259--269. IEEE, 2010.
[30]
Y. Ishai and E. Kushilevitz. Perfect constant-round secure computation via perfect randomizing polynomials. In Proceedings of the 29th International Colloquium on Automata, Languages, and Programming (ICALP), pages 244--256. Springer, 2002.
[31]
R. Jain and H. Klauck. The partition bound for classical communication complexity and query complexity. In Proceedings of the 25th Conference on Computational Complexity (CCC), pages 247--258. IEEE, 2010.
[32]
T. Jayram. Hellinger strikes back: A note on the multi-party information complexity of AND. In Proceedings of the 13th International Workshop on Randomization and Computation (RANDOM), pages 562--573. Springer, 2009.
[33]
T. Jayram, R. Kumar, and D. Sivakumar. Two applications of information complexity. In Proceedings of the 35th Symposium on Theory of Computing (STOC), pages 673--682. ACM, 2003.
[34]
S. Jukna. On graph complexity. Combinatorics, Probability, & Computing, 15(6):855--876, 2006.
[35]
S. Jukna. Boolean Function Complexity: Advances and Frontiers, volume 27 of Algorithms and Combinatorics. Springer, 2012.
[36]
H. Klauck. Rectangle size bounds and threshold covers in communication complexity. In Proceedings of the 18th Conference on Computational Complexity (CCC), pages 118--134. IEEE, 2003.
[37]
H. Klauck. Lower bounds for quantum communication complexity. SIAM Journal on Computing, 37(1):20--46, 2007.
[38]
H. Klauck. A strong direct product theorem for disjointness. In Proceedings of the 42nd Symposium on Theory of Computing (STOC), pages 77--86. ACM, 2010.
[39]
H. Klauck. On Arthur Merlin games in communication complexity. In Proceedings of the 26th Conference on Computational Complexity (CCC), pages 189--199. IEEE, 2011.
[40]
H. Klauck and S. Podder. Two results about quantum messages. In Proceedings of the 39th International Symposium on Mathematical Foundations of Computer Science (MFCS), pages 445--456. Springer, 2014.
[41]
H. Klauck and V. Prakash. Streaming computations with a loquacious prover. In Proceedings of the 4th Innovations in Theoretical Computer Science Conference (ITCS), pages 305--320. ACM, 2013.
[42]
H. Klauck and V. Prakash. An improved interactive streaming algorithm for the distinct elements problem. In Proceedings of the 41st International Colloquium on Automata, Languages, and Programming (ICALP), pages 919--930. Springer, 2014.
[43]
E. Kushilevitz. Privacy and communication complexity. SIAM Journal on Discrete Mathematics, 5(2):273--284, 1992.
[44]
E. Kushilevitz and N. Nisan. Communication Complexity. Cambridge University Press, 1997.
[45]
N. Linial and A. Shraibman. Learning complexity vs communication complexity. Combinatorics, Probability, & Computing, 18(1--2):227--245, 2009.
[46]
S. Lokam. Spectral methods for matrix rigidity with applications to size-depth trade-offs and communication complexity. Journal of Computer and System Sciences, 63(3):449--473, 2001.
[47]
S. Lokam. Complexity lower bounds using linear algebra. Foundations and Trends in Theoretical Computer Science, 4(1--2):1--155, 2009.
[48]
P. Papakonstantinou, D. Scheder, and H. Song. Overlays and limited memory communication. In Proceedings of the 29th Conference on Computational Complexity (CCC), pages 298--308. IEEE, 2014.
[49]
P. Pudl ak, V. Rödl, and P. Savick y. Graph complexity. Acta Informatica, 25(5):515--535, 1988.
[50]
R. Raz and A. Shpilka. On the power of quantum proofs. In Proceedings of the 19th Conference on Computational Complexity (CCC), pages 260--274. IEEE, 2004.
[51]
A. Razborov. On rigid matrices. Technical report, Steklov Mathematical Institute, 1989. In Russian.
[52]
A. Razborov. On the distributional complexity of disjointness. Theoretical Computer Science, 106(2):385--390, 1992.
[53]
K. Reinhardt and E. Allender. Making nondeterminism unambiguous. SIAM Journal on Computing, 29(4):1118--1131, 2000.
[54]
M. Santha. Relativized Arthur--Merlin versus Merlin--Arthur games. Information and Computation, 80(1):44--49, 1989.
[55]
U. Schöning. Probabilistic complexity classes and lowness. Journal of Computer and System Sciences, 39(1):84--100, 1989.
[56]
L. Valiant. Graph-theoretic arguments in low-level complexity. In Proceedings of the 6th Symposium on Mathematical Foundations of Computer Science (MFCS), pages 162--176. Springer, 1977.
[57]
L. Valiant. Completeness classes in algebra. In Proceedings of the 11th Symposium on Theory of Computing (STOC), pages 249--261. ACM, 1979.
[58]
H. Wunderlich. A note on a problem in communication complexity. Technical report, arXiv, 2012. arXiv:1205.0903.
[59]
H. Wunderlich. On a theorem of Razborov. Computational Complexity, 21(3):431--477, 2012.

Cited By

View all

Index Terms

  1. Zero-Information Protocols and Unambiguity in Arthur-Merlin Communication

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ITCS '15: Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science
    January 2015
    404 pages
    ISBN:9781450333337
    DOI:10.1145/2688073
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 January 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. arthur-merlin protocols
    2. communication complexity
    3. information complexity

    Qualifiers

    • Research-article

    Conference

    ITCS'15
    Sponsor:
    ITCS'15: Innovations in Theoretical Computer Science
    January 11 - 13, 2015
    Rehovot, Israel

    Acceptance Rates

    ITCS '15 Paper Acceptance Rate 45 of 159 submissions, 28%;
    Overall Acceptance Rate 172 of 513 submissions, 34%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)An Exponential Separation Between MA and AM Proofs of Proximitycomputational complexity10.1007/s00037-021-00212-330:2Online publication date: 18-Aug-2021
    • (2018)On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodingscomputational complexity10.1007/s00037-018-0170-xOnline publication date: 20-Aug-2018
    • (2017)From Private Simultaneous Messages to Zero-Information Arthur---Merlin Protocols and BackJournal of Cryptology10.1007/s00145-016-9239-330:4(961-988)Online publication date: 1-Oct-2017
    • (2017)Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and SeparationsAdvances in Cryptology – CRYPTO 201710.1007/978-3-319-63688-7_24(727-757)Online publication date: 29-Jul-2017
    • (2016)On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized EncodingsProceedings, Part III, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 981610.1007/978-3-662-53015-3_16(449-477)Online publication date: 14-Aug-2016
    • (2015)Rectangles Are Nonnegative JuntasProceedings of the forty-seventh annual ACM symposium on Theory of Computing10.1145/2746539.2746596(257-266)Online publication date: 14-Jun-2015
    • (2015)From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and BackTheory of Cryptography10.1007/978-3-662-49099-0_3(65-82)Online publication date: 24-Dec-2015

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media